bugcrowd / vulnerability-rating-taxonomyLinks
Bugcrowd’s baseline priority ratings for common security vulnerabilities
☆491Updated last month
Alternatives and similar repositories for vulnerability-rating-taxonomy
Users that are interested in vulnerability-rating-taxonomy are comparing it to the libraries listed below
Sorting:
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆460Updated 6 years ago
- ☆434Updated 2 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆469Updated 2 years ago
- ☆604Updated last year
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆751Updated 2 years ago
- Open-source vulnerability disclosure and bug bounty program database☆1,036Updated 2 months ago
- ☆364Updated 3 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆881Updated 2 weeks ago
- A collection of templates for bug bounty reporting☆421Updated 5 months ago
- Content discovery wordlists generated using BigQuery☆575Updated 5 years ago
- Tools and datas related to Bug Bounty.☆236Updated 3 years ago
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆536Updated 7 years ago
- ☆475Updated 4 years ago
- A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily rep…☆254Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆452Updated 5 years ago
- ☆828Updated last year
- 🎯 Open Redirect Payload List☆609Updated last year
- Open Redirect Payloads☆634Updated 11 months ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- Finds unknown classes of injection vulnerabilities☆704Updated 4 months ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆547Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆153Updated 7 years ago
- ☆211Updated 4 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆363Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆113Updated 8 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- A DNS Bruteforcing Wordlist Generator☆363Updated 2 years ago
- This repository created for personal use and added tools from my latest blog post.☆351Updated 2 years ago
- Second-order subdomain takeover scanner☆408Updated 3 weeks ago
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆519Updated 2 weeks ago